Scan container images for known vulnerabilities using Anchore Grype with SBOM-based matching and configurable
Skills(SKILL.md)は、AIエージェント(Claude Code、Cursor、Codexなど)に特定の能力を追加するための設定ファイルです。
詳しく見る →Scan container images for known vulnerabilities using Anchore Grype with SBOM-based matching and configurable
'This skill covers integrating Aqua Security''s Trivy scanner into CI/CD pipelines for comprehensive container
Trivy is a comprehensive open-source vulnerability scanner by Aqua Security that detects vulnerabilities in OS
Tenable Nessus is the industry-leading vulnerability scanner used to identify security weaknesses across network
Perform security risk analysis on Kubernetes resource manifests using Kubesec to identify misconfigurations,
'Performs advanced network reconnaissance using Nmap''s scripting engine, timing controls, evasion techniques,
'Securing API Gateway endpoints with AWS WAF by configuring managed rule groups for OWASP Top 10 protection,
'This skill guides practitioners through hardening AWS Identity and Access Management configurations to enforce
'Securing AWS Lambda execution roles by implementing least-privilege IAM policies, applying permission boundaries,
'This skill instructs security practitioners on deploying Microsoft Defender for Cloud as a cloud-native application
'Securing container registry images by implementing vulnerability scanning with Trivy and Grype, enforcing image
Harbor is an open-source container registry that provides security features including vulnerability scanning
'This skill covers hardening GitHub Actions workflows against supply chain attacks, credential theft, and privilege
Secure Helm chart deployments by validating chart integrity, scanning templates for misconfigurations, and enforcing
'This skill covers hardening and securing process historian servers (OSIsoft PI, Honeywell PHD, GE Proficy, AVEVA
'This skill covers hardening managed Kubernetes clusters on EKS, AKS, and GKE by implementing Pod Security Standards,
'This skill covers implementing secure remote access to OT/ICS environments for operators, engineers, and vendors
'This skill covers security hardening for serverless compute platforms including AWS Lambda, Azure Functions,
'Tests Android inter-process communication (IPC) through intents for vulnerabilities including intent injection,
'Tests API authentication mechanisms for weaknesses including broken token validation, missing authentication
'Tests REST and GraphQL APIs for Broken Object Level Authorization (BOLA/IDOR) vulnerabilities where an authenticated
'Tests APIs for mass assignment (auto-binding) vulnerabilities where clients can modify object properties they
Systematically assessing REST and GraphQL API endpoints against the OWASP API Security Top 10 risks using automated
Identifying and exploiting Cross-Origin Resource Sharing misconfigurations that allow unauthorized cross-domain
Systematically testing web applications for broken access control vulnerabilities including privilege escalation,
Identifying flaws in application business logic that allow price manipulation, workflow bypass, and privilege
Test web application email functionality for SMTP header injection vulnerabilities that allow attackers to inject
Test web applications for HTTP Host header injection vulnerabilities to identify password reset poisoning, web
Test JWT implementations for critical vulnerabilities including algorithm confusion, none algorithm bypass, kid
Identify and test open redirect vulnerabilities in web applications by analyzing URL redirection parameters,
Identifying sensitive data exposure vulnerabilities including API key leakage, PII in responses, insecure storage,
Test web applications for XML injection vulnerabilities including XXE, XPath injection, and XML entity attacks
Identifying and validating cross-site scripting vulnerabilities using Burp Suite's scanner, intruder, and repeater
'Tests web applications for Cross-Site Scripting (XSS) vulnerabilities by injecting JavaScript payloads into
Discovering and exploiting XML External Entity injection vulnerabilities to read server files, perform SSRF,
Assessing JSON Web Token implementations for cryptographic weaknesses, algorithm confusion attacks, and authorization
'Tests authentication and authorization mechanisms in mobile application APIs to identify broken authentication,
'Tests OAuth 2.0 and OpenID Connect implementations for security flaws including authorization code interception,
Test and validate ransomware recovery procedures including backup restore operations, RTO/RPO target verification,
'Tests WebSocket API implementations for security vulnerabilities including missing authentication on WebSocket
Threat actor infrastructure tracking involves monitoring and mapping adversary-controlled assets including command-and-control
'Triages security alerts in Splunk Enterprise Security by classifying severity, investigating notable events,
Classify and prioritize security incidents using structured IR playbooks to determine severity, assign response
'Performs initial triage of security incidents to determine severity, scope, and required response actions using
Triage and prioritize vulnerabilities using CISA's Stakeholder-Specific Vulnerability Categorization (SSVC) decision
Validate backup integrity through cryptographic hash verification, automated restore testing, corruption detection,
This target provides benchmark tooling for CLI workflows.
Generates optimized prompts for any AI tool. Use when writing, fixing, improving, or adapting a prompt for LLM, Cursor, Midjourney, image AI, video AI, coding agents, or any other AI tool.
>
Full website SEO audit with parallel subagent delegation. Crawls up to 500 pages, detects business type, delegates to up to 15 specialists (8 always + 7 conditional), generates health score. Use when user says audit, full SEO check, analyze my site, or website health check.